Symantec Endpoint Encryption 11.0.0 MP3

Symantec Endpoint
Encryption 11.0.0 MP3
Release Notes
Preface
Documentation version: 11.0.0 MP3, Release Date: March, 2015
Legal Notice
Copyright © 2015 Symantec Corporation. All rights reserved.
Symantec, the Symantec Logo, the Checkmark Logo, PGP, and Pretty Good Privacy are
trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S.
and other countries. Other names may be trademarks of their respective owners.
The product described in this document is distributed under licenses restricting its use,
copying, distribution, and decompilation/reverse engineering. No part of this document
may be reproduced in any form by any means without prior written authorization of
Symantec Corporation and its licensors, if any.
THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS,
REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT,
ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO
BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL
OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING,
PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED
IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
Symantec Corporation
350 Ellis Street
Mountain View, CA 94043
http://www.symantec.com
Technical Support
Symantec Technical Support maintains support centers globally. Technical
Support’s primary role is to respond to specific queries about product features
and functionality. The Technical Support group also creates content for our online
Knowledge Base. The Technical Support group works collaboratively with the
other functional areas within Symantec to answer your questions in a timely
fashion. For example, the Technical Support group works with Product Engineering
and Symantec Security Response to provide alerting services and virus definition
updates.
Symantec’s support offerings include the following:
■
A range of support options that give you the flexibility to select the right
amount of service for any size organization
■
Telephone and/or Web-based support that provides rapid response and
up-to-the-minute information
■
Upgrade assurance that delivers software upgrades
■
Global support purchased on a regional business hours or 24 hours a day, 7
days a week basis
■
Premium service offerings that include Account Management Services
For information about Symantec’s support offerings, you can visit our website at
the following URL:
www.symantec.com/business/support/
All support services will be delivered in accordance with your support agreement
and the then-current enterprise technical support policy.
Contacting Technical Support
Customers with a current support agreement may access Technical Support
information at the following URL:
www.symantec.com/business/support/
Before contacting Technical Support, make sure you have satisfied the system
requirements that are listed in your product documentation. Also, you should be
at the computer on which the problem occurred, in case it is necessary to replicate
the problem.
When you contact Technical Support, please have the following information
available:
■
Product release level
■
Hardware information
■
Available memory, disk space, and NIC information
■
Operating system
■
Version and patch level
■
Network topology
■
Router, gateway, and IP address information
■
Problem description:
■
Error messages and log files
■
Troubleshooting that was performed before contacting Symantec
■
Recent software configuration changes and network changes
Licensing and registration
If your Symantec product requires registration or a license key, access our technical
support Web page at the following URL:
www.symantec.com/business/support/
Customer service
Customer service information is available at the following URL:
www.symantec.com/business/support/
Customer Service is available to assist with non-technical questions, such as the
following types of issues:
■
Questions regarding product licensing or serialization
■
Product registration updates, such as address or name changes
■
General product information (features, language availability, local dealers)
■
Latest information about product updates and upgrades
■
Information about upgrade assurance and support contracts
■
Information about the Symantec Buying Programs
■
Advice about Symantec's technical support options
■
Nontechnical presales questions
■
Issues that are related to CD-ROMs, DVDs, or manuals
Support agreement resources
If you want to contact Symantec regarding an existing support agreement, please
contact the support agreement administration team for your region as follows:
Asia-Pacific and Japan
[email protected]
Europe, Middle-East, and Africa
[email protected]
North America and Latin America
[email protected]
Symantec Endpoint
Encryption 11.0.0
Maintenance Packs
This document includes the following topics:
■
About Symantec Endpoint Encryption
■
Where to get more information about Symantec Endpoint Encryption version
11.0.0
■
What's changed in Symantec Endpoint Encryption
■
Installing the Symantec Endpoint Encryption Maintenance Pack
■
Documentation errata
About Symantec Endpoint Encryption
Symantec Endpoint Encryption v11.0.0 provides organizations with reliable full
disk encryption, removable media protection and intuitive central management.
Powered by PGP technology, our Drive Encryption client renders data at rest
inaccessible to unauthorized parties on laptops and desktops. The Removable
Media Encryption functionality enables end users to quickly move sensitive data
onto USBs, external hard drives, and memory cards while management features
compliance-based, out-of-the-box and customizable reporting to enable
administrators to quickly prove systems were protected in the case of loss or theft
and manage deployments.
8
Symantec Endpoint Encryption 11.0.0 Maintenance Packs
Where to get more information about Symantec Endpoint Encryption version 11.0.0
Where to get more information about Symantec
Endpoint Encryption version 11.0.0
The following Symantec Endpoint Encryption documentation is available from
the Symantec Technical Support website:
Table 1-1
Symantec Endpoint Encryption documentation
Name of the guide
Web address
Symantec Endpoint Encryption 11.0.0 Drive http://www.symantec.com/docs/DOC7520
Encryption Getting Started Guide
Symantec Endpoint Encryption 11.0.0
Removable Media Encryption Getting
Started Guide
http://www.symantec.com/docs/DOC7521
Symantec Endpoint Encryption 11.0.0
Installation Guide
http://www.symantec.com/docs/DOC7523
Symantec Endpoint Encryption 11.0.0
Upgrade Guide
http://www.symantec.com/docs/DOC7715
Symantec Endpoint Encryption 11.0.0 Policy http://www.symantec.com/docs/DOC7522
Administrator Guide
Symantec Endpoint Encryption 11.0.0
Release Notes
http://www.symantec.com/docs/DOC7519
Symantec Endpoint Encryption 11.0.0 Drive http://www.symantec.com/docs/DOC7716
Encryption Administrator Command Line
Guide
Integrating Symantec Endpoint Encryption http://www.symantec.com/docs/DOC7639
11.0.0 with Symantec Data Loss Prevention
What's changed in Symantec Endpoint Encryption
This section describes the new features and other changes made in Symantec
Endpoint Encryption.
What's changed in Symantec Endpoint Encryption 11.0.0 MP3
This section describes the new features and other changes included in MP3.
Symantec Endpoint Encryption 11.0.0 Maintenance Packs
What's changed in Symantec Endpoint Encryption
What's new in Symantec Endpoint Encryption 11.0.0 MP3
This section describes the new features included in MP3.
Drive Encryption:
■
Added the ability for administrators to create master system images.
See “Using Symantec Endpoint Encryption with system images” on page 23.
■
Added the ability for administrators to specify whether to include or skip the
encryption of unused disk space. This install-time policy can speed up the time
it takes to encrypt a disk but has certain security implications.
See “Including or skipping the encryption of unused disk space” on page 21.
■
Users are now prompted to reconfigure their self-recovery questions if policy
has changed and the questions are no longer in conformance.
See “Updates to the policy enforcement of Drive Encryption Self-Recovery ”
on page 23.
Removable Media Encryption:
■
Provided compatibility with SEE Removable Storage 8.2.1 format.
See “Encrypting Removable Media Encryption files with a Removable Storage
format” on page 28.
See “Encrypting files in the Removable Storage format using the Removable
Media Access Utility” on page 31.
■
Added new session passwords, so users can create temporary passwords when
they want to share a file without having to provide default passwords to access
a file.
See “Using Removable Media Encryption with session passwords” on page 25.
■
Added additional reports for session passwords.
See “Viewing new or changed report content” on page 32.
Resolved Issues in Symantec Endpoint Encryption 11.0.0 MP3
■
Resolved the issue that caused blue screen errors after Symantec Endpoint
Encryption Drive Encryption was installed on Microsoft Windows systems
using HP custom images. [3717299]
■
Resolved an issue so that Microsoft Windows Explorer does not stop
unexpectedly when you access mapped Distributed File System (DFS) shares
on the client computers with Symantec Endpoint Encryption Removable Media
Encryption 11.0.0 MP3 installed. [3683540]
9
10
Symantec Endpoint Encryption 11.0.0 Maintenance Packs
What's changed in Symantec Endpoint Encryption
Additional information about Symantec Endpoint Encryption
11.0.0 MP3
■
Decryption of Removable Media Encryption sensitive files with DLP
integration: When Removable Media Encryption uses the Automatic
Encryption policy option of Encrypt file as per Symantec Data Loss Prevention
and an Encryption Format policy option of SEE RS, which is compatible with
Symantec Endpoint Encryption Removable Storage version 8.2.1, sensitive
files are decrypted when the auto-decrypt time interval expires.” [3670852,
3669212]
What's changed in Symantec Endpoint Encryption 11.0.0 MP2
Maintenance Pack 2 was removed from General Availability and replaced with
the Maintenance Pack 3 release.
What's changed in Symantec Endpoint Encryption version 11.0.0 MP1
This section describes the new features and other changes included in Maintenance
Pack 1.
What's new in Symantec Endpoint Encryption version 11.0.0
MP1
This section describes the new features included in Maintenance Pack 1.
■
Added the ability to configure policy so that authentication can be bypassed
at preboot.
See “Autologon management through policy” on page 34.
■
Asterisks are now displayed when users enter their password at preboot
authentication.
See “Asterisks displayed for passwords during preboot authentication”
on page 36.
■
Improved the look of the BIOS preboot authentication screen, so you can now
specify a logo, background image, and custom text color.
See “BIOS preboot screen enhancements” on page 35.
Resolved issues in Symantec Endpoint Encryption version
11.0.0 MP1
■
Resolved an issue so that the disk encryption status of a Drive Encryption
client is updated in the Management Console as soon as disk encryption is
initiated. [3567481]
Symantec Endpoint Encryption 11.0.0 Maintenance Packs
What's changed in Symantec Endpoint Encryption
■
Drive Encryption client computers now properly display the Last check-in
date and time of the latest communication of a client computer with the
Symantec Endpoint Encryption Management Server. [3579004]
■
Drive Encryption client computers that boot in UEFI-mode now properly
display the pause duration time between incorrect password attempts at
preboot authentication. [3586535]
■
Resolved an issue so that client computers no longer stop communicating with
a Symantec Endpoint Encryption Management Server that is installed on a
Microsoft Windows Server 2008 R2 system when administrators use the SEEMS
Configuration Manager to change the database credentials. [3611136]
Additional information about Symantec Endpoint Encryption
version 11.0.0 MP1
■
Upgrading Symantec Endpoint Encryption Management Server from version
11.0.0: While upgrading Symantec Endpoint Encryption Management Server
version 11.0.0 to version 11.0.0 MP1, the user domain is not automatically
populated on the Database Access screen of the installer if the database uses
Windows Authentication and if you checked Enable TLS/SSL in the Database
Config tab of the SEEMS Configuration Manager before running the installer.
This issue also occurs if you installed Symantec Endpoint Encryption
Management Server using SQL Authentication for database access and then
later changed the Authentication Mode to Windows Integrated Authentication.
To work around this issue, before you run the installer, edit the
GEServerConfig.xml file (located in the Symantec Endpoint Encryption
Management Server installation directory), and change the <item
name="DBUser">user</item> entry in the DBconnection section of the file
to <item name="DBUser">domain\user</item>. [3623882]
■
Saving the Symantec Endpoint Encryption Management Server 11.0.0 logs:
When you upgrade Symantec Endpoint Encryption Management Server from
version 11.0.0 to 11.0.0 MP1, the existing log data is not saved. To work around
this issue, back up the files that are located in the <Installation
Directory>\Services\logs directory before running the installer if you want
to save the existing log data. [3640137]
■
Dual management console functionality requires Symantec Endpoint
Encryption 8.2.1 MP14: If you use Symantec Endpoint Encryption 11.0.0 with
dual management consoles, your 8.2.1 environment requires Symantec
Endpoint Encryption 8.2.1 MP14 if you want to generate MSIs for SEE Full
Disk or SEE Removable Storage clients. [3649650]
11
12
Symantec Endpoint Encryption 11.0.0 Maintenance Packs
Installing the Symantec Endpoint Encryption Maintenance Pack
■
Single sign-on and smart cards: If it takes too long for the Microsoft Windows
boot process to initialize the smart card reader or the smart card, single sign-on
may not always work. There is no workaround at this time. [3635438]
■
Legal Notice on splash screen: In the Japanese version of the Endpoint
Encryption client, the maximum number of characters displayed on the splash
screen is 512, instead of 1024. This is due to the double-byte Japanese
characters occupying double the width of Latin characters when displayed.
[3650614]
■
Legal Notice on login screen: In the Endpoint Encryption client, the maximum
number of characters displayed on the login screen is 80. In the Japanese
version, the maximum will be 40 due to the double-byte Japanese characters
occupying double the width of Latin characters when displayed. [3650622]
■
Legal Notice on splash screen: In the Endpoint Encryption client, the maximum
number of characters displayed on the splash screen is 1024. There is also a
limit of 19 lines of text, therefore not all 1024 characters may be displayed as
some longer words can cause lines to wrap early. [3638089]
Installing the Symantec Endpoint Encryption
Maintenance Pack
This section includes information about installing the Symantec Endpoint
Encryption Maintenance Pack
Installing the Symantec Endpoint Encryption Maintenance Pack
versions 11.0.0 MP1 and 11.0.0 MP3 on the server
The following sections include information about installing the Maintenance Pack
release on the Symantec Endpoint Encryption Management Server and the
Management Console.
System requirement changes for the server in version 11.0.0
MP3
Added Symantec Endpoint Encryption Management Server compatibility with
the following Microsoft Windows Server platforms:
■
Microsoft Windows Server 2012 R2 Datacenter, November 2014 Update, 64-bit
version
■
Microsoft Windows Server 2012 R2 Standard, November 2014 Update, 64-bit
version
Symantec Endpoint Encryption 11.0.0 Maintenance Packs
Installing the Symantec Endpoint Encryption Maintenance Pack
Added Management Console compatibility with the following Microsoft Windows
platforms:
■
Microsoft Windows Server 2012 R2 Datacenter, November 2014 Update, 64-bit
version
■
Microsoft Windows Server 2012 R2 Standard, November 2014 Update, 64-bit
version
■
Microsoft Windows 8.1 Enterprise, November 2014 Update, 32-bit and 64-bit
versions
■
Microsoft Windows 8.1 Pro, November 2014 Update, 32-bit and 64-bit versions
System requirement changes for the server in version 11.0.0
MP1
Added Symantec Endpoint Encryption Management Server compatibility with
the following Microsoft Windows Server platforms:
■
Microsoft Windows Server 2012 R2 Datacenter, April 2014 Update, 64-bit
version
■
Microsoft Windows Server 2012 R2 Standard, April 2014 Update, 64-bit version
■
Microsoft Windows Server 2012 R2 Datacenter, August 2014 Update, 64-bit
version
■
Microsoft Windows Server 2012 R2 Standard, August 2014 Update, 64-bit
version
Added Management Console compatibility with the following Microsoft Windows
platforms:
■
Microsoft Windows Server 2012 R2 Datacenter, April 2014 Update, 64-bit
version
■
Microsoft Windows Server 2012 R2 Standard, April 2014 Update, 64-bit version
■
Microsoft Windows Server 2012 R2 Datacenter, August 2014 Update, 64-bit
version
■
Microsoft Windows Server 2012 R2 Standard, August 2014 Update, 64-bit
version
■
Microsoft Windows 8.1 Enterprise, August 2014 Update, 32-bit and 64-bit
versions
■
Microsoft Windows 8.1 Pro, August 2014 Update, 32-bit and 64-bit versions
13
14
Symantec Endpoint Encryption 11.0.0 Maintenance Packs
Installing the Symantec Endpoint Encryption Maintenance Pack
Instructions for installing the Symantec Endpoint Encryption
Maintenance Pack version 11.0.0 MP1 or 11.0.0 MP3 on the
server
Symantec Endpoint Encryption Management Server supports an upgrade from
all previous versions.
Note: You are not required to provide the Management Password when you upgrade
the Management Console. However, you must still provide the Management
Password when you upgrade the Symantec Endpoint Encryption Management
Server. You create your Management Password when you complete a new
installation of Symantec Endpoint Encryption.
For more information about the Management Password, see the topic “About the
Management Password” in the Symantec Endpoint Encryption 11.0 Installation
Guide.
1
Make sure that your environment meets the minimum system requirements.
To review the system requirements, see the article: “Symantec Endpoint
Encryption Management Server – System Requirements” at:
http://www.symantec.com/docs/TECH224478
2
Make sure that you have completed all of the prerequisite steps that are
required to install Symantec Endpoint Encryption. These steps include tasks
such as setting up accounts and roles, configuring Microsoft SQL Server,
installing prerequisite software, setting up .NET, and configuring TLS/SSL
communications.
To review the prerequisite tasks, see the topic “Symantec Endpoint Encryption
prerequisites” in the Symantec Endpoint Encryption 11.0 Installation Guide.
3
Run the Symantec Endpoint Encryption Management Server installation MSI.
When you run the MSI, consider the following:
The MSI file supports the following functionality:
■
You can run the installer by double-clicking the MSI file.
■
You can run a new installation from the command line by running: msiexec
/i <package name>
■
You can upgrade from supported versions from the command line by
running: msiexec /i <package name>
■
You can uninstall the application in the Microsoft Windows Add/Remove
Programs list.
The MSI file does not support the following functionality:
Symantec Endpoint Encryption 11.0.0 Maintenance Packs
Installing the Symantec Endpoint Encryption Maintenance Pack
4
5
■
You cannot use the command line to run a silent installation with the /q
command, or other variants.
■
You cannot use the command line to run a repair of an installation with
the /f command.
■
You cannot use the command line to run a minor upgrade with the
REINSTALLMODE and REINSTALL commands.
■
You cannot use push technologies. The Symantec Endpoint Encryption
Management Server and the Management Console do not support
deployment through push technologies.
Follow the steps in the wizard. For more information, see the following:
■
To install the Symantec Endpoint Encryption Management Server for the
first time, see the topic: "Running the Symantec Endpoint Encryption
Management Server Installation Wizard - process overview" in the
Symantec Endpoint Encryption 11.0 Installation Guide.
■
To upgrade the Symantec Endpoint Encryption Management Server, see
the topic "Upgrading the Symantec Endpoint Encryption Management
Server" in the Symantec Endpoint Encryption 11.0 Upgrade Guide.
Run the Management Console installation MSI. When you run the MSI,
consider the following:
The MSI file supports the following functionality:
■
You can run the installer by double-clicking the MSI file.
■
You can run a new installation from the command line by running: msiexec
/i <package name>
■
You can upgrade from supported versions from the command line by
running: msiexec /i <package name>
■
You can uninstall the application in the Microsoft Windows Add/Remove
Programs list.
The MSI file does not support the following functionality:
■
You cannot use the command line to run a silent installation with the /q
command, or other variants.
■
You cannot use the command line to run a repair of an installation with
the /f command.
■
You cannot use the command line to run a minor upgrade with the
REINSTALLMODE and REINSTALL commands.
15
16
Symantec Endpoint Encryption 11.0.0 Maintenance Packs
Installing the Symantec Endpoint Encryption Maintenance Pack
■
6
7
You cannot use push technologies. The Symantec Endpoint Encryption
Management Server and the Management Console do not support
deployment through push technologies.
Follow the steps in the wizard. For more information, see the following:
■
If you installed Management Console for the first time, see the topic:
"Installing the Management Console - process overview" in the Symantec
Endpoint Encryption 11.0 Installation Guide.
■
If you upgraded Symantec Endpoint Encryption Management Server, see
the topic "Upgrading the Management Console" in the Symantec Endpoint
Encryption 11.0 Upgrade Guide.
After you complete the wizard, you must complete some post-installation
configuration steps. For more information, see the following:
■
To install Symantec Endpoint Encryption Management Server for the first
time, see the section: "Configuring the Symantec Endpoint Encryption
Management Server" in the Symantec Endpoint Encryption 11.0 Installation
Guide.
■
To upgrade Symantec Endpoint Encryption Management Server, see the
topic "Configuring the Symantec Endpoint Encryption Management Server
- process overview" in the Symantec Endpoint Encryption 11.0 Upgrade
Guide.
Installing the Symantec Endpoint Encryption Maintenance Pack
versions 11.0.0 MP1 and 11.0.0 MP3 on the clients
This section includes information on the new platforms that are added and
instructions for installing the Maintenance Pack versions 11.0.0 MP1 and 11.0.0
MP3 on the clients.
System requirement changes for the clients in version 11.0.0
MP3
System requirement changes for Drive Encryption
Added Drive Encryption compatibility with the following Microsoft Windows
platforms:
■
Microsoft Windows 8.1 Enterprise, November 2014 Update, 32-bit and 64-bit
versions
■
Microsoft Windows 8.1 Pro, November 2014 Update, 32-bit and 64-bit versions
Symantec Endpoint Encryption 11.0.0 Maintenance Packs
Installing the Symantec Endpoint Encryption Maintenance Pack
Added Drive Encryption compatibility with the following Microsoft Windows
Server platforms:
■
Microsoft Windows Server 2012 R2 Datacenter, November 2014 Update, 64-bit
version
■
Microsoft Windows Server 2012 R2 Standard, November 2014 Update, 64-bit
version
System requirement changes for Removable Media Encryption
Added Removable Media Encryption compatibility with the following Microsoft
Windows platforms:
■
Microsoft Windows 8.1 Enterprise, November 2014 Update, 32-bit and 64-bit
versions
■
Microsoft Windows 8.1 Pro, November 2014 Update, 32-bit and 64-bit versions
Added Removable Media Encryption compatibility with the following Microsoft
Windows Server platforms:
■
Microsoft Windows Server 2012 R2 Datacenter, November 2014 Update, 64-bit
version
■
Microsoft Windows Server 2012 R2 Standard, November 2014 Update, 64-bit
version
System requirement changes for the clients in version 11.0.0
MP1
System requirement changes for Drive Encryption
Added Drive Encryption compatibility with the following Microsoft Windows
platforms:
■
Microsoft Windows 8.1 Enterprise, August 2014 Update, 32-bit and 64-bit
versions
■
Microsoft Windows 8.1 Pro, August 2014 Update, 32-bit and 64-bit versions
Added Drive Encryption compatibility with the following Microsoft Windows
Server platforms:
■
Microsoft Windows Server 2012 R2 Datacenter, August 2014 Update, 64-bit
version
■
Microsoft Windows Server 2012 R2 Standard, August 2014 Update, 64-bit
version
System requirement changes for Removable Media Encryption
17
18
Symantec Endpoint Encryption 11.0.0 Maintenance Packs
Installing the Symantec Endpoint Encryption Maintenance Pack
Added Removable Media Encryption compatibility with the following Microsoft
Windows platforms:
■
Microsoft Windows 8.1 Enterprise, August 2014 Update, 32-bit and 64-bit
versions
■
Microsoft Windows 8.1 Pro, August 2014 Update, 32-bit and 64-bit versions
Added Removable Media Encryption compatibility with the following Microsoft
Windows Server platforms:
■
Microsoft Windows Server 2012 R2 Datacenter, August 2014 Update, 64-bit
version
■
Microsoft Windows Server 2012 R2 Standard, August 2014 Update, 64-bit
version
Added Removable Media Access Utility compatibility with Mac OS X 10.9.5 and
Mac OS X 10.10.
Instructions for installing the Symantec Endpoint Encryption
Maintenance Pack version 11.0.0 MP1 or 11.0.0 MP3 on the
clients
To upgrade clients from Symantec Endpoint Encryption version 11.0.0 to version
11.0.0 MP1 or 11.0.0 MP3, you upgrade the Symantec Endpoint Encryption
Management Agent, Drive Encryption, Removable Media Encryption, and
optionally Autologon clients by running the msiexec commands.
About the client installer packages: location and names
■
The version 11.0.0 MP1 and 11.0.0 MP3 packages are installed in the same
installation folder where the version 11.0.0 packages were installed.
Follow the naming conventions as follows, for the Maintenance Pack that you are
installing
For 11.0.0 MP1:
■
The version 11.0.0 MP1 Management Agent, Drive Encryption, and Removable
Media Encryption package names must match the respective version 11.0.0
package names. The administrator defines these names when the administrator
creates the client installers on the Management Console.
■
The version 11.0.0 MP3 Management Agent, Drive Encryption, and Removable
Media Encryption package names can be different from the respective version
11.0.0 or 11.0.0 MP1 package names.
Prerequisites: Before you upgrade
Symantec Endpoint Encryption 11.0.0 Maintenance Packs
Installing the Symantec Endpoint Encryption Maintenance Pack
Before you upgrade the client computer, make sure that the following requirements
are met:
■
You have saved all of your work and closed any open files.
■
If Removable Media Encryption is installed, you have:
■
■
Closed any third-party programs that read and write to removable media.
■
Dismounted and disconnected any removable media from the client
computer.
If Drive Encryption is installed, you have:
■
Closed any third-party programs that read or write to the disk.
■
Ensured that the disk is either completely encrypted or decrypted. If
encryption or decryption is in progress, wait until the disk is completely
encrypted or decrypted.
Upgrading the clients in sequence
To successfully upgrade the clients, you must upgrade the clients in the following
sequence:
1.
Management Agent
2.
Removable Media Encryption
3.
Drive Encryption
If the Removable Media Encryption functionality is not installed on the client
computer, then you can first upgrade the Management Agent, followed by Drive
Encryption.
If the Drive Encryption functionality is not installed on the client computer, then
you can first upgrade the Management Agent, followed by Removable Media
Encryption.
■
To install Symantec Endpoint Encryption 11.0.0 MP1 or 11.0.0 MP3 on the client
computer
To upgrade the client installer packages, you must:
■
Use the msiexec command; do not double-click the client MSIs.
■
Run the msiexec command with administrative rights.
1
To upgrade the Management Agent, run the following command:
% msiexec /i <filename>.msi REINSTALLMODE="vemus"
REINSTALL="Complete" /qn /norestart /Live "install.log"
19
20
Symantec Endpoint Encryption 11.0.0 Maintenance Packs
Installing the Symantec Endpoint Encryption Maintenance Pack
where the <filename> is one of the following:
■
If the client computer's operating system is 32-bit: SEE Management Agent
Client.msi
■
If the client computer's operating system is 64-bit: SEE Management Agent
Client_x64.msi
2
To upgrade Removable Media Encryption, run the following command:
% msiexec /i <filename>.msi REINSTALLMODE="vemus"
REINSTALL="Complete" /qn /norestart /Live "install.log"
where the <filename> is one of the following:
■
If the client computer's operating system is 32-bit: SEE Removable Media
Encryption Client.msi
■
If the client computer's operating system is 64-bit: SEE Removable Media
Encryption Client_x64.msi
Note: If Removable Media Encryption is the last client .MSI to be upgraded,
then do not include the ‘/norestart’ parameter in the command.
3
To upgrade Drive Encryption, run the following command:
% msiexec /i <filename>.msi REINSTALLMODE="vemus"
REINSTALL="Complete" /qn /Live "install.log"
where the <filename> is one of the following:
■
If the client computer's operating system is 32-bit: SEE Drive Encryption
Client.msi
■
If the client computer's operating system is 64-bit: SEE Drive Encryption
Client_x64.msi
Note: To get the updated Drive Encryption preboot settings, restart your
client computer again.
4
(Optional) To upgrade Autologon, run the following command:
% msiexec /i <filename>.msi REINSTALLMODE="vemus"
REINSTALL="Complete" /qn /Live "install.log"
where the <filename> is one of the following:
Symantec Endpoint Encryption 11.0.0 Maintenance Packs
Documentation errata
■
If the client computer's operating system is 32-bit:
Autologon NoAutologon.msi
or
Autologon Infinite <dd mmm yyyy>.msi
■
If the client computer's operating system is 64-bit:
Autologon NoAutologon_x64.msi
or
Autologon Infinite <dd mmm yyyy>_x64.msi
Documentation errata
Documentation errata for Symantec Endpoint Encryption 11.0.0 MP3
This section includes information about documentation errata for Symantec
Endpoint Encryption 11.0.0 MP3.
Drive Encryption feature enhancements
This section includes information about documentation errata for the Drive
Encryption feature in the Symantec Endpoint Encryption 11.0.0 MP3 release.
Including or skipping the encryption of unused disk space
About including or skipping encryption of unused disk space
On the Drive Encryption – Encryption policy, a new advanced option lets you
include or skip the encryption of unused disk space on the client computer. If you
elect to include unused disk space, Drive Encryption encrypts all sectors, including
the unused sectors. The include unused disk space option is selected by default
and Drive Encryption encrypts all sectors. If you elect to skip unused disk space,
Drive Encryption skips the encryption of unused sectors.
As in Symantec Endpoint Encryption 11.0.0 MP3, the Encryption policy is available
only at install time. This advanced option, therefore, is enforced only during the
initial auto-encryption process, when the Drive Encryption MSI is installed on
the client computer. If you re-encrypt the disk later, this policy is ignored, and
all sectors are encrypted.
Note: Client administrators, however, can use Drive Encryption Administrator
Command Line at any time, to issue an encrypt command with the option to skip
unused disk space.
21
22
Symantec Endpoint Encryption 11.0.0 Maintenance Packs
Documentation errata
This policy option applies to the following file systems: NTFS and FAT32. Skipping
the unused disk space substantially reduces the initial time required to encrypt
the disk and therefore, improves the end-user experience. With strict encryption
compliance requirements, you can now quickly encrypt the disk on new computers
before handing them over to the users.
Security considerations when you skip encryption of unused disk space
The skip unused disk space option only encrypts the disk space that is currently
in use by Windows for storing files and data during initial encryption. Any data
that was deleted before initial encryption is marked as unused disk space by
Windows and is not encrypted during initial encryption, posing a possible security
risk. Therefore, it is recommended that the skip unused disk space option should
only be used to quickly encrypt new systems before you hand them to users. If
you re-use older computers or disks for new users, it is recommended to do a
low-level format to delete all traces of existing data before deployment. All new
data written to disk is encrypted. The unused disk space that was skipped during
initial encryption is encrypted when new data is written to it.
Using a policy to include or skip the encryption of unused disk space
On the Management Console on the Drive Encryption – Encryption install-time
policy, under Advanced Options choose one of the following settings:
■
To include the encryption of the unused disk space while encrypting the disks
and partitions, check Include unused disk space when encrypting disks and
partitions. This check box is selected by default.
■
To skip the encryption of the unused disk space while encrypting the disks
and partitions, uncheck Include unused disk space when encrypting disks
and partitions. A message box appears to warn you about the potential security
risk that if the unused disk space is not encrypted, the data that was deleted
before initial encryption may still be accessible.
For more information on creating install-time policies or creating the Drive
Encryption installation package, refer to the Symantec Endpoint Encryption Policy
Administrator Guide.
Using the Administrator Command Line to skip encryption of the unused sectors
on the disk
Purpose: The --encrypt command with the --skip-unused-space option skips
the encryption of unused disk space and encrypts only those sectors on the disk
that contain data. Client administrators can use this command even if the Include
unused disk space when encrypting disks and partitions policy option is not
selected on the Drive Encryption - Encryption policy installed on a client computer.
Usage format:
Symantec Endpoint Encryption 11.0.0 Maintenance Packs
Documentation errata
eedAdminCli --encrypt --disk <number> --skip-unused-space --au
<AdminUserName> --ap <AdminPassword>
Example:
eedAdminCli --encrypt --disk 0 --skip-unused-space --au jsmith --ap
safepass
Command output:
Request sent to Start encrypt disk was successful.
This example shows that the administrator with the username jsmith and password
safepass has started disk encryption skipping the unused sectors on the boot disk
0.
Note: To know whether the feature to skip the encryption of the unused disk space
is enabled on a client computer, client administrators can use the following
command: eedAdminCli --status --disk <disk number> --verbose
For more information on using the Administrator Command Line interface, see
the Symantec Endpoint Encryption Drive Encryption Administrator Command Line
Guide.
Updates to the policy enforcement of Drive Encryption
Self-Recovery
The behavior of the Drive Encryption Self-Recovery prompt has changed. The
user is now prompted to reconfigure the self-recovery question and answers if
they do not comply with the current policy.
The prompt is based on the following conditions:
■
If the user has configured two questions and the policy is changed so that two
questions come from the server, then the user is prompted to reconfigure their
Drive Encryption Self-Recovery questions.
■
If the user has configured two questions, and the policy is changed so that
three questions are necessary, then the user is prompted to reconfigure their
Drive Encryption Self-Recovery questions.
■
If the user has configured three questions and now the policy has changed so
that two questions are necessary, then user is not prompted.
Using Symantec Endpoint Encryption with system images
A system image is a template of a system configuration. A system administrator
prepackages the image with the operating system and software. The administrator
23
24
Symantec Endpoint Encryption 11.0.0 Maintenance Packs
Documentation errata
can deploy the image to endpoint computers so that each computer shares the
same setup and configuration. Enterprise environments commonly use system
images to configure computers to a pristine, working state.
In some cases, Symantec Endpoint Encryption is also included as part of the image
as an installed application so that installation is not necessary later. You can
provision Drive Encryption and Removable Media Encryption on system images
and use Symantec Endpoint Encryption Management Server to manage encryption
on your imaged computers. However, you must install the software with a specific
command line switch to prevent potential problems.
Before you provision Drive Encryption and Removable Media Encryption on a
system image, be aware of the following limitations:
■
When you install on system images, you cannot run the installation file by
double-clicking it. You must install from the command line and use a specific
switch.
■
You cannot use system images as VDI master images.
■
You cannot create a system image from another system image that already
has Symantec Endpoint Encryption products installed.
■
The install time on cloned images is not unique. Each cloned image shares the
same install time. Your reports in Symantec Endpoint Encryption Management
Server display the same install time for each cloned computer. If you need to
access the specific time when a cloned image first started running Symantec
Endpoint Encryption, you must use the event logs. The logs include an event
called "cloned."
■
You cannot use Drive Encryption and Removable Media Encryption
functionality on your system image. However, when you create a cloned image,
Symantec Endpoint Encryption applies the install-time policies and can run
as normal.
■
Drive Encryption and Removable Media Encryption do not work until you
deploy the image. On the cloned image, the install-time policies execute
normally.
Installing Symantec Endpoint Encryption products on a system image
When you install Symantec Endpoint Encryption products on a system image,
you must use a specific command line parameter. This command line parameter
instructs the installer to install into a system image environment and to use
specific settings.
The command line parameter is: IMAGE=SYSTEM
For example:
Symantec Endpoint Encryption 11.0.0 Maintenance Packs
Documentation errata
msiexec /i "SEE Management Agent Client_x64.msi" IMAGE=SYSTEM
To install Symantec Endpoint Encryption products on a system image:
1
On the Symantec Endpoint Encryption Management Server, create the client
installer packages (MSIs) by running the Installation Wizards for Management
Agent, Drive Encryption, and Removable Media Encryption.
2
On your system image, prepare the system image by running the command
line for the Management Agent MSI.
3
Deploy the system image.
4
When the computer is imaged the install-time policies are instantiated.
5
Update the clone as you would any client computer, using GPOs and native
policies, as desired.
6
Over time, the cloned clients check in with the server. Run reports to track
the state of your cloned clients.
Removable Media Encryption feature enhancements
This section includes information about documentation errata for the Removable
Media Encryption feature in the Symantec Endpoint Encryption 11.0.0 MP3 release.
Using Removable Media Encryption with session passwords
About session passwords
Session passwords allow users the flexibility to share the files that are encrypted
with temporary passwords, without disclosing their default password. A user
typically shares a session password with a small number of other users for a
specific purpose.
After a user provides a session password the first time, the user is no longer
prompted for credentials when they open the related encrypted files. Files
encrypted with session passwords are also encrypted with the default password,
if it is active. Up to two session passwords can be active at one time.
A policy administrator sets a policy option to control session passwords. The
administrator may or may not allow session passwords. When passwords are
allowed, the policy option defines the expiration behavior.
End users use the client console interface to define and activate the session
passwords. The users can change their session passwords at any time.
Setting the session password policy option on the server
On the Symantec Endpoint Encryption Management Server, the Removable Media
Encryption - Default Passwords panel contains the session password option. This
25
26
Symantec Endpoint Encryption 11.0.0 Maintenance Packs
Documentation errata
policy is available at installation time, as a GPO, or as a native policy. Session
passwords can remain active indefinitely, or they can expire. One policy setting
is to expire session passwords permanently (delete them) at the end of each
Windows session. Alternatively, another policy setting is to expire session
passwords temporarily (deactivate them) when a Windows session ends. Users
must reactivate the session passwords when they begin a new Windows session.
The policy options are:
■
■
To allow the use of session passwords, select Allow users to set session
passwords. This setting is the default.
Define the expiration characteristics by choosing one of the following:
■
Delete session passwords at the end of every Windows session
■
Deactivate session passwords at the end of every Windows session, but
allow them to persist across every Windows session
■
Do not delete or deactivate session passwords. This setting is the default.
To not allow the use of session passwords, select Do not allow users to set
session passwords.
Defining and activating the session password(s) on the client
On the client computers, end users use the Management Agent console to define
and activate session passwords. New fields for session passwords now exist in the
Removable Media Password panel. The behavior of the fields is based on policy.
■
If the policy does not allow session passwords, the Session Password 1 and
Session Password 2 fields are collapsed and unavailable. The On/Off toggle
is set to Off in red font.
■
If the policy allows session passwords, the Session Password 1 and Session
Password 2 fields are collapsed but available for user input. The On/Off toggle
is set to Off in red font.
To set and activate session passwords on the Removable Media Password panel,
a user:
■
Expands Session Password 1.
■
Defines and confirms a password.
■
Optionally adds a hint, to remind the user of what the password is.
■
Clicks Save. The toggle changes to On.
■
To define a second session password, the user repeats the process for Session
Password 2.
Symantec Endpoint Encryption 11.0.0 Maintenance Packs
Documentation errata
The same user aids are available on the Password panel for both the default
password and the session passwords. That is, the user can select Show password
to display a password as characters rather than as dots. The user can also click
the exclamation mark to see the requirements that you have defined for Symantec
Endpoint Encryption passwords.
Notes:
■
If two session passwords are active, a file is encrypted with both of the session
passwords. The file is also encrypted with the default password, if it is active.
■
A user can change a session password at any time.
■
Users who have administrator privileges should check the Symantec Endpoint
Encryption policies that are active on their computer. The policy for session
passwords defines if and when these passwords are set to expire. If they expire
temporarily (are deactivated) at the end of each Windows session, the users
must manually reactivate them by setting each password's toggle to On. If
they expire permanently (are deleted) at the end of each Windows session, the
users must redefine them.
About activating and deactivating session passwords
Users activate or deactivate Removable Media Encryption session passwords by
using the On/Off toggle. When a user enters a password and saves it, the toggle
automatically defaults to On. Deactivating a password makes the password
unusable but does not remove it from the computer. The user can reactivate the
password by moving the toggle to the On position.
For more information on how to create install-time policies, GPOs, or native
policies, refer to the Symantec Endpoint Encryption Policy Administrator Guide,
version MP3. For more information on the Management Agent user interface,
from the Management Agent click on the Client online Help.
Deactivating and reactivating the default password in
Removable Media Encryption
In Removable Media Encryption, users can now deactivate the default password
that they have set. Deactivating the default password gives users the flexibility
to be prompted temporarily for a different password when encrypting particular
files, if required. It also lets users encrypt files only to session passwords, if they
are allowed by policy and activated. If the user wants to use the default password
again, the user can reactivate it without having to redefine it.
Users can continue to set the default password in two ways:
■
Go to the Management Agent console interface and use the Removable Media
Encryption Password panel.
27
28
Symantec Endpoint Encryption 11.0.0 Maintenance Packs
Documentation errata
■
Enter the password in the Set Default Password dialog box that may appear
when they encrypt a file.
Moreover, users now can leave the default password set, then later deactivate or
re-activate it by toggling On or Off. By default, the toggle option is On when the
user sets the default password. The user can deactivate the default password by
setting the toggle to Off. Deactivating the default password makes the password
unusable but does not remove it from the computer. The user can always reactivate
it by setting the toggle back to On.
Encrypting Removable Media Encryption files with a Removable
Storage format
About
Users can now encrypt files on removable media storage devices using Removable
Media Encryption so that the files are compatible with Symantec Endpoint
Encryption Removable Storage client version 8.2.1.
Setting the Encryption Format policy option on the server
The new Encryption Format policy option is available on the Removable Media
Encryption Access and Encryption policy panel. With the Encryption Format
policy option settings, you can encrypt files so that they can be used on client
computers running:
■
Symantec Endpoint Encryption 8.2.1
■
Symantec Endpoint Encryption 11.0.0 or later
You can set the Encryption Format policy option during installation, or when you
create or update a native policy or GPO. The Encryption Format options are:
■
SEE RME: Select this option to encrypt files using the Removable Media
Encryption format. This format allows users to decrypt and read files on client
computers running Symantec Endpoint Encryption 11.0.0 or later.
■
SEE RS: Select this option to encrypt files using the Removable Storage format.
This format allows registered users to decrypt and read files on the client
computers running Symantec Endpoint Encryption 8.2.1.
Regardless of the Encryption Format option that you select, Removable Media
Encryption can decrypt an encrypted file.
The Encryption Format policy option also applies to on-demand encryption. Also,
on-demand decryption works for files encrypted with the SEE RS format, whether
the files are decrypted from a removable device inserted into a client running
Symantec Endpoint Encryption 11.0.0 MP3 or Symantec Endpoint Encryption
8.2.1.
Symantec Endpoint Encryption 11.0.0 Maintenance Packs
Documentation errata
Using the Encryption Format policy option in a managed environment
You must carefully consider the implications of using each encryption format
option and take appropriate precautions for each. The following scenarios describe
some of the effects of using a particular encryption format policy option and the
actions you can take to make the selection successful for your users.
SharingfilesoftenbetweenRemovableStorageandRemovableMediaEncryption
If your users share files often between Removable Storage 8.2.1 and Removable
Media Encryption 11.0.0 MP3, Symantec recommends that you select the SEE RS
option as the encryption format for your Removable Media Encryption client
computers. If you select the SEE RME option and encrypt a Removable Storage
file using Removable Media Encryption, the file becomes inaccessible on Removable
Storage client computers.
Preliminary actions you can take:
■
Before selecting an Encryption Format policy option, evaluate the extent to
which your users share files between the two removable-storage encryption
software systems. If file sharing is frequent, select the SEE RS option.
Editing a file that is encrypted with the Removable Storage format
If you select SEE RS as the encryption format for a Removable Media Encryption
client computer, users can edit files originally encrypted on Removable Storage
computers. When a user saves the edits, the encrypted format is compatible with
Removable Storage. The user can then open or decrypt that modified file on their
Removable Storage computer. However, an issue can arise over the credentials
with which the edited file may be re-encrypted when it is saved.
The issue is that the original credentials with which the Removable Storage file
was encrypted may be discarded and replaced with Removable Media Encryption
credentials. This condition can arise in the following situation.
Unless Removable Media Encryption is running with the DLP option selected,
Removable Media Encryption automatically encrypts any new file that users create
on a removable storage device. On a Removable Media Encryption client computer,
some applications that a user uses to edit a file create a temporary file, which
Removable Media Encryption identifies as a new file. Microsoft Office is one of
these applications.
When the user finishes editing the file, therefore, Removable Media Encryption
re-encrypts the temporary file based on the Encryption Method policy. This policy
defines how files are encrypted: with a password, a certificate, or both a password
and a certificate. Because Removable Media Encryption identifies the temporary
file as new, it does not use the original Removable Storage credentials, but rather
uses whatever credentials are defined in its encryption-method policy.
29
30
Symantec Endpoint Encryption 11.0.0 Maintenance Packs
Documentation errata
Thus, when the user attempts to open the file on their Removable Storage
computer, the decryption of the file may fail. The failure is based not on a format
incompatibility, but on a credentials incompatibility. Therefore, to use this
encrypted file on the Removable Storage computer, users must provide the
password, or the certificate, or both, that was enabled on the Removable Media
Encryption client computer during the file modification process.
Preliminary actions you can take:
■
Make your users aware of what can happen when they edit a Removable Storage
file using certain applications on a Removable Media Encryption computer.
(Newly saved files can have their encryption credentials changed.) Note that
text editors do not have this issue.
■
Confirm that your users are aware of what the Encryption Method policy is
for their computer. (Are they encrypting using a password, a certificate, or
both password and certificate?)
■
Remind your users that even if they are not prompted for credentials at the
time they save a file, Removable Media Encryption can change the encryption
credentials without user intervention, by using a default password and/or a
default certificate that is already user-defined.
■
If files are re-encrypted on a Removable Media Encryption computer with new
credentials, make sure that users know that they must provide those new
credentials when they return to their Removable Storage computers to decrypt
the files.
Editing a Removable Storage file encrypted with multiple certificates
Removable Storage lets users encrypt files using multiple certificates. To open or
decrypt a file, a user provides at least one of those certificates as the decryption
credential. Removable Media Encryption, however, allows users to encrypt files
with only one certificate.
Therefore, even if an administrator selects the SEE RS Encryption Format option,
which allows users to move files between Removable Media Encryption computers
and Removable Storage computers, the decryption of that file on the Removable
Storage computer could fail. This failure would not be an issue of encryption
format incompatibility, but of encryption credentials incompatibility.
On a Removable Storage computer, the decryption failure of a file can happen for
two reasons. When the user attempts to open the file on the Removable Storage
computer, following its re-encryption on a Removable Media Encryption computer,
either:
■
The user no longer has that particular certificate out of the multiple certificates
originally used, or
Symantec Endpoint Encryption 11.0.0 Maintenance Packs
Documentation errata
■
The user never had that certificate available. The new certificate that is used
for encryption is probably the Removable Media Encryption default certificate
Preliminary action you can take:
■
Inform your users that whatever certificate they use on their Removable Media
Encryption computer for file encryption must be available on their Removable
Storage computer as well.
Editing a file encrypted with a format other than the format that policy supports
Removable Media Encryption is able to open (decrypt) files encrypted with either
of the encryption formats. However, Symantec recommends that your users do
not edit a file encrypted with a format other than the format that the policy option
supports.
For example, if a file is already encrypted to the Removable Media Encryption
format, but the policy option enables the SEE RS format, the user should not edit
the file. If the encrypted file format does not match the active policy, a change of
format could result.
Encrypting files in the Removable Storage format using the
Removable Media Access Utility
About encrypting files in the Removable Storage format using the Removable
Media Access Utility
Users can now use the Removable Media Access Utility for Windows or the
Removable Media Access Utility for Mac OS X to encrypt files that are compatible
with Symantec Endpoint Encryption Removable Storage version 8.2.1.
Encrypting files on the Removable Media Access Utility to different encryption
formats
On the Management Console, the new Encryption Format policy option is available
on the Removable Media Encryption - Access and Encryption policy panel. You
can select one of the following format settings:
■
SEE RME (format for Symantec Endpoint Encryption 11.0.0 MP3 or later)
■
SEE RS (format for Symantec Endpoint Encryption 8.2.1)
Settings that apply to the Removable Media Access Utility are made known in
different ways. For Removable Media Access Utility for Windows, the policy setting
is embedded. For Removable Media Access Utility for Mac OS X, a name change
indicates the setting.
If you selected the SEE RS encryption format, the executable file name that is
written to the removable device is modified to include a capital letter "C." The "C"
stands for compatibility. The executable file name becomes
31
32
Symantec Endpoint Encryption 11.0.0 Maintenance Packs
Documentation errata
RemovableMediaAccessUtilityC.dmg. If you selected the SEE RME encryption
format, the name is not changed; the Removable Media Encryption format is
assumed.
A user knows which format a file is encrypted with by looking at the Encrypted
column in the Removable Media Access Utility user interface: Yes indicates the
Removable Media Encryption format; SEERS indicates the Removable Storage
format.
Issues that can arise with file sharing and editing related to encryption format
policy options are described in these sections:
■
Editing a file that is encrypted with the Removable Storage format
■
Editing a Removable Storage file encrypted with multiple certificates
■
Editing a file encrypted with a format other than the format that policy supports
Upgrading the Removable Media Access Utility from Removable
Storage Access Utility
Notification for Removable Media Access Utility upgraded from Removable
Storage Access Utility
If you have a removable storage device that has Removable Storage Access Utility
8.2.1 on it, the older version of the utility is replaced with the newer version of
Removable Media Access Utility 11.0.0 MP3.
The first time you insert this device on a client computer that has Removable
Media Encryption 11.0.0 MP3 installed and Access Utility enabled, the 8.2.1 version
of Access Utility is replaced with the latest version. To indicate the Access Utility
upgrade, a balloon notification appears on the Microsoft Windows 7 operating
systems and a toast notification appears on the Microsoft Windows 8 operating
systems.
Viewing new or changed report content
Viewing the Encryption Format policy setting in reports
In Symantec Endpoint Encryption reports, the RME Encryption Format column
indicates the current value of the Encryption Format policy setting in Removable
Media Encryption as configured by the administrator.
The RME Encryption Format column is displayed in the Computer Status Report
and the Removable Media Encryption Details Report by default. You can customize
other reports to display or hide this column as needed.
For information about customizing reports to display and hide columns, refer to
the Symantec Endpoint Encryption Policy Administrator Guide.
Symantec Endpoint Encryption 11.0.0 Maintenance Packs
Documentation errata
Note: For the client computers that use a version of Removable Media Encryption
earlier than 11.0.0 MP3, no value is displayed.
Viewing the Session Password policy setting in reports
The RME Session Passwords column indicates the current behavior of session
passwords in Removable Media Encryption as defined by the administrator.
Alternatively, it also indicates whether session passwords are disabled.
The RME Session Passwords column is not displayed in any reports by default.
You can customize reports to display or hide the RME Session Passwords column
as needed.
For information about customizing reports to display and hide columns, refer to
the Symantec Endpoint Encryption Policy Administrator Guide.
Change in the Removable Media Encryption password policy information that
is displayed in reports
In Symantec Endpoint Encryption reports, the RME Passwords column now
indicates all of the active password policies in Removable Media Encryption. As
of version MP3 11.0.0, Removable Media Encryption supports both default
passwords and session passwords. When the administrator enables multiple
password policies, they appear separated by semicolons (;).
Updates to the toggle button in Management Agent's user
interface for the Removable Media Encryption password panel
The Removable Media Encryption password panel includes the following updates:
■
When the user successfully sets or updates the password, the toggle button is
automatically set to the On state.
■
When the user attempts to set the toggle button to the On state, without first
setting a password, an error is displayed.
■
The user must first enter and save a password. The toggle button is then set
to On.
This behavior applies to all of the passwords, including the default and the session
passwords.
Documentation errata for Symantec Endpoint Encryption 11.0.0 MP1
This section includes information about documentation errata.
33
34
Symantec Endpoint Encryption 11.0.0 Maintenance Packs
Documentation errata
Autologon management through policy
The Autologon feature temporarily removes the preboot authentication credential
prompt on a client computer for administrative purposes. Currently, client
administrators enable or disable Autologon on client computers through the Drive
Encryption Administrator Command Line. The new feature allows a server policy
administrator to define and distribute a remote policy that manages Autologon.
Note: You must install the Autologon utility MSI on a client computer before you
can apply the Autologon policy.
The Drive Encryption – Autologon policy options are:
■
To enable Autologon remotely, select Always Autologon. No preboot
authentication credentials are required from the user. This setting remains
active until you deploy another Autologon policy.
■
To disable Autologon remotely, select Never Autologon. Users are always
prompted for their preboot authentication credentials. This policy remains
active until you deploy another Autologon policy.
■
To give control to the Drive Encryption Administrator Command Line to enable
or disable Autologon locally, select Autologon only when activated by admin
locally.
Note: If you change Autologon management from policy-based to command-line
based, the default state of Autologon is disabled. The client administrator must
issue the appropriate local command through the Administrator Command Line
interface to enable Autologon.
Note: If an "Always Autologon" or "Never Autologon" policy is active and you
attempt to enable or disable Autologon through the command line, you will receive
an error message that the command line is disabled.
The following sequence shows the order of precedence in which the Autologon
policy is applied to a managed client computer:
1.
Autologon settings from a policy (highest precedence)
2.
Autologon settings from Drive Encryption Administrator Command Line
3.
Autologon MSI (lowest precedence)
If you are updating pre-11.0.0 clients (Symantec Endpoint Encryption 8.2 or
earlier), the policy options for defining the number of times to boot without
authentication, and single or recurring usage parameters, are displayed but not
Symantec Endpoint Encryption 11.0.0 Maintenance Packs
Documentation errata
available for update. The clients keep those settings until you deploy a new
Autologon policy through Symantec Endpoint Encryption 11.0.0 MP1.
For more information on creating GPO or native policies, refer to the Symantec
Endpoint Encryption Policy Administrator Guide. For more information on using
the Drive Encryption Administrator Command Line, refer to the Symantec Endpoint
Encryption Drive Encryption Administrator Command Line Guide.
BIOS preboot screen enhancements
You can define a legal notice and modify the font color on the splash screen. You
can also suppress the splash screen. You can define a background image as well
as change the font for your instructions on the Drive Encryption preboot login
screen.
When you create the Startup install-time policy, you can do the following:
■
To suppress the splash screen at startup, select No splash screen.
■
To use the default Symantec Endpoint Encryption logo (image), select The SEE
logo.
■
To use your company’s preferred image, select and upload A custom image.
■
Change the default legal notice and choose black or white for the text color.
Black is the default. You cannot change the text color when using the SEE logo.
For the preboot login screen, you can do the following:
■
To use the default Symantec Endpoint Encryption logo (image), select The SEE
logo.
■
To use your company’s preferred image, select and upload A custom image.
■
Change the default logon message and choose black or white for the text color.
Black is the default.
When you create a policy to update the startup panel, you can do the following:
■
To suppress the screen at startup, select No splash screen.
■
To use the default Symantec Endpoint Encryption logo (image), select The SEE
logo.
■
To use your company’s preferred image that you predefined at installation
time, select The custom image, if available.
■
Change the default legal notice.
For the preboot login screen, you can do the following:
■
To use the default Symantec Endpoint Encryption logo (image), select The SEE
logo.
35
36
Symantec Endpoint Encryption 11.0.0 Maintenance Packs
Documentation errata
■
To use your company’s preferred image that you predefined at installation
time, select The custom image, if available.
Note: If you are updating pre-11.0.0 clients, the previous options for Logon
instructions and Enable Safe Mode Boot are displayed but not available.
For more information on creating install-time policies or GPO or native-policy
updates, refer to the Symantec Endpoint Encryption Policy Administrator Guide.
Asterisks displayed for passwords during preboot
authentication
By default, the preboot authentication screen now displays asterisk characters
instead of the random-stepping of the curser though blank spaces when a user or
client administrator enters a password.
Client administrators can use Symantec Endpoint Encryption Drive Encryption
Administrator Command Line to switch this functionality between asterisks and
the random-stepping of the cursor.
To configure preboot authentication formatting, use the following command:
■
Usage Format:
eedAdminCli --bootprop-set --name “PWDFORMAT” --val <num> --au
<AdminUserName> --ap <AdminPassword>
Where val is the flag that indicates to either use asterisks or random-stepping
formatting. The number 0 sets asterisks and the number 1 sets
random-stepping.
■
The following is an example that shows how to configure preboot
authentication to use asterisks:
eedAdminCli --bootprop-set --name “PWDFORMAT” --val 0 --au jsmith
--ap safepass
■
The following is an example that shows how to configure preboot
authentication to use random-stepping of the cursor:
eedAdminCli --bootprop-set --name “PWDFORMAT” --val 1 --au jsmith
--ap safepass
For more information about using Symantec Endpoint Encryption Drive Encryption
Administrator Command Line, see the Symantec Endpoint Encryption Drive
Encryption Administrator Command Line Guide.